Arama Sonuçları Information technology -- Security measuresSirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002btechnology$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300?2024-11-12T21:07:07ZDijital güvenlik : dijital ortamlarda güvenle var olmakent://SD_ILS/0/SD_ILS:5171792024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Özer, Fatih. Şahin, Yusuf Levent, editör<br/>Yer Numarası QA76.9.E74 O94 2022<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Cybersecurity education for awareness and complianceent://SD_ILS/0/SD_ILS:4820922024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Vasileiou, Ismini, 1980- editor. Furnell, Steven, 1970- editor. IGI Global, publisher.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7847-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security science : measuring the vulnerability to data compromisesent://SD_ILS/0/SD_ILS:4589682024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Young, Carl S., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128096437">http://www.sciencedirect.com/science/book/9780128096437</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Total information risk management maximizing the value of data and information assetsent://SD_ILS/0/SD_ILS:3066932024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Borek, Alexander.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:3557702024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Andress, Jason, author.<br/>Yer Numarası ONLINE(355770.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007440">http://www.sciencedirect.com/science/book/9780128007440</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security without obscurity : a guide to confidentiality, authentication, and integrityent://SD_ILS/0/SD_ILS:3566812024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Stapleton, Jeffrey James, author.<br/>Yer Numarası ONLINE(356681.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Messier, Ric, author.<br/>Yer Numarası ONLINE(355829.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The frugal CISO : using innovation and smart approaches to maximize your security postureent://SD_ILS/0/SD_ILS:3566242024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Anderson, Kerry Ann, author.<br/>Yer Numarası ONLINE(356624.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781482220087">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The benefits and security risks of web-based applications for business trend reportent://SD_ILS/0/SD_ILS:3066402024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Kotwica, Kathleen.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170018">http://www.sciencedirect.com/science/book/9780124170018</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>FISMA and the risk management framework the new practice of federal cyber securityent://SD_ILS/0/SD_ILS:1459362024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Gantz, Stephen D. Philpott, Daniel R.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496414">http://www.sciencedirect.com/science/book/9781597496414</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Yer Numarası HF5548.37 W67 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Asset protection through security awarenessent://SD_ILS/0/SD_ILS:2861362024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Speed, Tyler Justin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439809839">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance simplified from the boardroom to the keyboardent://SD_ILS/0/SD_ILS:2906622024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Fitzgerald, Todd.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439811658">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security strategy from requirements to realityent://SD_ILS/0/SD_ILS:2888512024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Stackpole, Bill. Oksendahl, Eric.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439827345">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical risk management for the CIOent://SD_ILS/0/SD_ILS:2915712024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Scherling, Mark.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439856543">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Hayden, Lance.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Engineering information security the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:2499162024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Jacobs, Stuart.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim IEEE Xplore <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Auditing cloud computing a security and privacy guideent://SD_ILS/0/SD_ILS:2992632024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Halpert, Ben, 1986-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Image <a href="http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg">http://images.contentreserve.com/ImageType-100/0128-1/{F889EE2A-CF12-4647-85E0-03258F227FC1}Img100.jpg</a>
Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=44303">http://www.books24x7.com/marc.asp?bookid=44303</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118269091">http://dx.doi.org/10.1002/9781118269091</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={F889EE2A-CF12-4647-85E0-03258F227FC1}&Format=410</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The basics of information security understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:1453712024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Andress, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496537">http://www.sciencedirect.com/science/book/9781597496537</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Vulnerability managementent://SD_ILS/0/SD_ILS:2878952024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Foreman, Park.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439801512">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:2869312024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Trinckes, John J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439810088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teamsent://SD_ILS/0/SD_ILS:2978622024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Kouns, Jake. Minoli, Daniel, 1952- Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470558133">http://dx.doi.org/10.1002/9780470558133</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:2887442024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Collette, Ronald D. Gentile, Michael. Gentile, Skye.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420089110">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data protection governance, risk management, and complianceent://SD_ILS/0/SD_ILS:2897002024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Hill, David G. (David Gary), 1943-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security management metrics a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2913732024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420052862">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security governance a practical development and implementation approachent://SD_ILS/0/SD_ILS:2977432024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Brotby, W. Krag.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=433807</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470476017">http://dx.doi.org/10.1002/9780470476017</a>
<a href="http://site.ebrary.com/lib/alltitles/Doc?id=10313652">http://site.ebrary.com/lib/alltitles/Doc?id=10313652</a>
<a href="http://swb.eblib.com/patron/FullRecord.aspx?p=433807">http://swb.eblib.com/patron/FullRecord.aspx?p=433807</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information warfareent://SD_ILS/0/SD_ILS:3040692024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Ventre, Daniel.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9781118381533">http://dx.doi.org/10.1002/9781118381533</a>
<a href="http://lib.myilibrary.com?id=477736">http://lib.myilibrary.com?id=477736</a>
OverDrive (PDF) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=50</a>
OverDrive (EPUB) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=410</a>
OverDrive (READ) <a href="http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610">http://www.contentreserve.com/TitleInfo.asp?ID={02D73229-3728-4EE5-942B-28D4B82AED18}&Format=610</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Transportation infrastructure security utilizing intelligent transportation systemsent://SD_ILS/0/SD_ILS:2976842024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Fries, Ryan Nicholas. Chowdhury, Mashrur A. Brummond, Jeffrey. Wiley InterScience (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/9780470432853">http://dx.doi.org/10.1002/9780470432853</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:3064712024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Vellani, Karim H., 1971-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:1486612024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Vellani, Karim H., 1971-<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">http://www.sciencedirect.com/science/book/9780123708977</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Strategic security management a risk assessment guide for decision makersent://SD_ILS/0/SD_ILS:1122012024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Vellani, Karim H., 1971- ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123708977">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at managing information securityent://SD_ILS/0/SD_ILS:2536772024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Osborne, Mark. Summitt, Paul M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491105">http://www.sciencedirect.com/science/book/9781597491105</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:2883062024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Kairab, Sudhanshu.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203507230">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security assessment case studies for implementing the NSA IAMent://SD_ILS/0/SD_ILS:2540302024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Rogers, Russ.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266962">http://www.sciencedirect.com/science/book/9781932266962</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multilingual dictionary of IT security : English, German, French, Spanish, Italianent://SD_ILS/0/SD_ILS:787962024-11-12T21:07:07Z2024-11-12T21:07:07ZYazar Vollnhals, Otto.<br/>Yer Numarası REF/QA 76.9.A25 V887 1999<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>